[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Qureshi et al., 2020 - Google Patents

IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings

Qureshi et al., 2020

Document ID
11756694356651572942
Author
Qureshi A
Afaqui M
Salas J
Publication year
Publication venue
International Conference on Security and Privacy in New Computing Environments

External Links

Snippet

In the pursuit of cities to be more efficient and responsive, various kind of Internet of Things (IoT) devices, such as actuators and sensors are used. This paper focuses on one specific IoT application-the smart building, and investigates the security and privacy issues in an …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Ravidas et al. Access control in Internet-of-Things: A survey
Atlam et al. IoT security, privacy, safety and ethics
Varshney et al. Architectural model of security threats & theircountermeasures in iot
Rao et al. Security and privacy issues in smart cities/industries: technologies, applications, and challenges
Huang et al. SecIoT: a security framework for the Internet of Things
JP2022073909A (en) Smart building integration and device hub
Elkhodr et al. The internet of things: New interoperability, management and security challenges
Mahmoud et al. Internet of things (IoT) security: Current status, challenges and prospective measures
Yousuf et al. Internet of things (IoT) security: current status, challenges and countermeasures
Campbell et al. Towards security and privacy for pervasive computing
Lata et al. Security and privacy issues in fog computing environment
Seitz et al. Use cases for authentication and authorization in constrained environments
CN109923592B (en) Method and system for access control and awareness management
Neisse et al. Dynamic context-aware scalable and trust-based IoT security, privacy framework
Alqarni et al. Internet of things (IoT) security requirements: Issues related to sensors
KR101837289B1 (en) Trust evaluation model and system in iot
Caviglione et al. Analysis of human awareness of security and privacy threats in smart environments
Quadar et al. Cybersecurity issues of IoT in ambient intelligence (AmI) environment
Qureshi et al. IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings
US20220006791A1 (en) Secured Node Authentication and Access Control Model for IoT Smart City
Khan et al. Mitigating security challenges in smart home management through smart lock
Kumari et al. Internet of things (iot): Concepts, protocols, and applications
Vasilescu et al. IoT security challenges for smart homes
KR102534826B1 (en) System for providing smarthome based end-to-end security service using portable security unit
Ramzan et al. A review study on smart homes present challenges concerning awareness of security mechanism for internet of things (iot)